pwnii
@pwnwithlove
Followers
3K
Following
3K
Media
43
Statuses
536
bug bounty lover, breaking stuff on @yeswehack & worldcuping 🇫🇷 at @Hacker0x01 || president of @esnhack, trying to keep hacking underground || CVE-2023-44352
ଘ(∩^o^)⊃━☆:・゚✧*:・゚✧✯♡❀
Joined November 2021
today with @Brumens2 we received a 50,000€ reward for discovering a bug in a public program !! don't be shy, go hunt in public programs too @yeswehack ʚ(。˃ ᵕ ˂ )ɞ
56
26
471
In the latest episode of #TalkiePwnii, @pwnwithlove kicks off a brand-new Android hacking series! 📱 Learn how to set up Genymotion, Android Studio and the essential tools to start hunting on mobile. Ready? 👇 #BugBountyTips #YesWeRHackers
https://t.co/2iQTDnyY0p
0
6
52
bug bounties bought me this view last month (*ᴗ͈ˬᴗ͈)ꕤ*.゚🇯🇵 started hunting bugs, ended up hunting the perfect ramen in Japan.. thanks @yeswehack
3
3
187
SSL pinning blocking your traffic? Medusa by @Ch0pin comes with ready Frida scripts for common bypasses, with many modules including ssl unpinning to test against pinned apps. Full setup guide 👉 https://t.co/A7EAPoKf3U
#BugBounty #BugBountyTips
yeswehack.com
Covering the pros and cons of emulators versus real devices, and how to configure Magisk, Burp, Frida, Medusa and other mobile hacking tools.
0
19
154
[INFO] L'association ESN'HACK a changé de bureau pour l'année 2025-2026. Prochainement, beaucoup de choses vont changer. Toutes les informations seront sur https://t.co/zKMpgfraXn.
0
3
5
just dropped a new article about my current way of setting up an android bug bounty lab ヾ(˶ᵔ ᗜ ᵔ˶) it’s the setup I use myself, and I’ve found nice web bugs on android apps with nothing more than a rooted pixel, frida, and some traffic interception https://t.co/Fcg70n4r5V
yeswehack.com
Covering the pros and cons of emulators versus real devices, and how to configure Magisk, Burp, Frida, Medusa and other mobile hacking tools.
6
43
176
In the latest #TalkiePwnii, @pwnwithlove takes on a Dojo challenge about predictable tokens & YAML deserialization in Python 🐍 From predictable tokens to achieving RCE via unsafe YAML load - watch the full exploit 👇 #BugBountyTips #YesWeRHackers
https://t.co/hRBY96bXRO
0
6
25
The whitepaper is live! Learn how to win the HTTP desync endgame... and why HTTP/1.1 needs to die:
http1mustdie.com
Upstream HTTP/1.1 is inherently insecure, and routinely exposes millions of websites to hostile takeover. Join the mission to kill HTTP/1.1 now
19
247
752
In the latest #TalkiePwnii, @pwnwithlove dives into Hex Color Palette, a Dojo challenge she created 🎨 From XXE exploitation to error-based file disclosure via parameter entities in lxml - learn how to use local DTD to exfiltrate sensitive files👇 https://t.co/0xaMlmiVoX
5
9
44
in lxml <= 5.3.2 with libxml2 2.12.x, XXE using parameter entities was possible due to libxml2 behavior - allowing indirect overrides of local DTDs. this worked even without resolve_entities, since libxml2 expanded parameter entities anyway :) it didn’t really make noise since
bugs.launchpad.net
lxml lib from 5.0.0 restricts XXE parsing and requires resolve_entities to disable the restriction Thus the xml below ``` ]> &xxe; ``` will not work without resolve_entities: ``` from lxml import...
What happens when a Dojo challenge collides with a library update? 🔍 The Hex Color Palette challenge used to rely on a specific XXE flow – until lxml changed the rules. Find out why our latest Dojo report includes two different payloads and reports that leak the same flag via
0
1
31
Want to get more out of @CaidoIO for your #BugBounty workflow? There might be a surprise in the video... 🎁 In Part 2 of our #TalkiePwnii Caido series, @pwnwithlove explores advanced features and plugins like QuickSSRF, AuthMatrix, YesWeCaido & more 👇 https://t.co/1fEvT4pMRo
2
11
44
Good writing here by @yeswehack. When I get nostalgic on recon, I often 'dig' into the past using some variation of what's mention in the article, though my approach is more manual than tools (by simply spending more time on wayback machine). https://t.co/Z3e1Ne8jtd
yeswehack.com
Learn and leverage the lessons of internet history: on the merits of archive-based recon plus some useful commands and tools for performing these techniques.
2
22
108
📱 Want to pwn Android apps from the inside? Let’s talk about Drozer, one of the most powerful tools for Android app security. It allows you to explore and interact with internal app components (like Activities, Services, Broadcast Receivers, and ContentProviders) to uncover
1
29
128
In the latest episode of #TalkiePwnii, @pwnwithlove analyses Ruby Treasure, a Dojo challenge by @Brumens2 💎 From regex bypass to RCE through https://t.co/hapWHurtzH in Ruby - see how weak validation can lead to code execution! 👇 #YesWeRHackers
https://t.co/IYRyrfU2W1
0
3
22
Know much about finding and exploiting path traversal or arbitrary file read vulnerabilities? 🤔 Learn practical attacks leveraging ../../ to bypass filters, hit internal APIs, and read sensitive files across systems 👇 https://t.co/yr0fec5Dff
yeswehack.com
Know much about exploiting path traversal or arbitrary file read vulnerabilities? Learn some practical attacks for unearthing high impact, lucrative vulnerabilities.
0
8
35
i've made some android challenges - feel free to check them out if you're into that kind of stuff! they’re pretty rare in most CTFs :p the last one is based on a real bug bounty I reported, and is linked to a real application I can control ;)
🚨 QUALIFIERS ARE NOW OPEN! Good luck to all the challengers, the CTF will close tomorrow at 8 P.M (Paris time). ➡️ Join the Insurrection right here:
0
5
26
Curious to find out how @CaidoIO could fit into your #BugBounty workflow? 🐞 In this special episode of #TalkiePwnii, @pwnwithlove shows Caido’s core features - from HTTP interception to workflow automation. Don't miss it 👇 #BugBountyTips #Caido
https://t.co/OvvgsYCHxN
0
12
60
OwnAppV2, Proxying and Reversing a Flutter apk | BreizhCTF WU - @pwnwithlove
https://t.co/VQ7SDgAb7P
pwnwithlove.com
Flutter detection Lorsque l’on décompile l'apk à l’aide de jadx, on voit clairement dans le MANIFEST.MF la présence de libflutter.so, indiquant que l’application utilise flutter. Lorsque l’on run...
3
38
112